A survey of blockchain from security perspective
2019, Journal of Banking and Financial Technology
https://doi.org/10.1007/S42786-018-00002-6Abstract
The report starts with an overview of the blockchain security system and then highlights the specific security threats and summarizes them. We review with some comments and possible research direction. This survey, we examines the security issues of blockchain model related technologies and their applications. The blockchain is considered a still growing like the internet in 1990. It has the potential to disrupt so many technology areas in the future. But as a new underdeveloped field, it is suffering many setbacks mostly resulting from the security area. Its security concerns coming not only from distributed/ decentralized computing issue or Cryptography algorithm issue, from some unexpected field too. Here, in this paper, we tried to classify the security concerns for the blockchain based on our survey from recent research papers. We also tried to show which way blockchain development trends are going.
References (68)
- Amine Ferrag M, Derdour M, Mukherjee M, Derhab A (2018) Blockchain technologies for the internet of things: research issues and challenges. IEEE, New York
- Avanade (2018) Cloud solutions that deliver the speed you need to become a digital business. Avanade, Seattle
- Bahri L, Carminati B, Ferrari E (2018) Decentralized privacy preserving services for online social networks. Online Soc Netw Media 6:18-25
- Bennett R, Pickering M, Sargent J (2018) Innovations in land data governance: unstructured data, nosql, blockchain, and big data analytics unpacked. In: Land and poverty conference 2018. Land governance in an interconnected world, Washington, DC, 19-23 Mar 2018
- Bernstein DJ, Lange T (2014) Safecurves: choosing safe curves for elliptic-curve cryptography. University of Illinois, Chicago
- Boireau O (2018) Securing the blockchain against hackers. Netw Secur 2018(1):8-11
- Buntinx J (2017) What is bitcoin fungibility. The Merkle, London
- Foundation E (ed.) (n.d.) Privacy on the Blockchain. Retrieved November 01, 2018, from https ://blog.ether eum.org/2016/01/15/ priva cy-on-the-block chain /
- Buterin V (n.d.) Ethereum Project. Retrieved November 1, 2018, from http://www.ether eum.org/
- Decker C, Wattenhofer R (2013) Information propagation in the Bitcoin network. IEEE P2P 2013 Proceedings, pp. 1-10
- Choo R, He X, Lin C, He D, Vasilakos AV (2018) Bsein: a block- chain-based secure mutual authentication with fine-grained access control system for industry 4.0. Netw Comput Appl 116:42-52
- Carey JE, Gerard SN (2018) U.S. Patent Application No. 15/374,493
- Chen Y, Li Q, Wang H (2018) Towards Trusted Social Networks with Blockchain Technology. arXiv preprint: arXiv :1801.02796
- Cichosz SL, Stausholm MN, Kronborg T, Vestergaard P, Hejlesen O (2018) How to use blockchain for diabetes health care data and access management: an operational concept. J Diab Sci technol. https ://doi.org/10.1177/19322 96818 79028 1
- Cimpanu C (2017) 74% of all Bitcoin-Related Sites Suffered a DDoS Attack. Retrieved November 1, 2018, from https ://www. bleep ingco mpute r.com/news/secur ity/74-perce nt-of-all-bitco in-relat ed-sites -suffe red-a-ddos-attac k/
- Clauson KA, Breeden EA, Davidson C, Mackey TK (2018) Lev- eraging blockchain technology to enhance supply chain manage- ment in Healthcare. Blockchain in Healthcare Today
- Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoper- ability of electronic health records using blockchain technology. Sustain Cities Soc 39:283-297
- Dataeum: First Blockchain Solution that Produces 100% Accu- rate Data through Crowdsourcing (2018) Retrieved November 1, from https ://www.cnbca frica .com/apo/2018/04/12/datae um-first -block chain -solut ion-that-produ ces-100-accur ate-data-throu gh- crowd sourc ing/
- de Vries A (2018) Bitcoin's growing energy problem. Joule 2(5):801-805
- Android random number flaw implicated in Bitcoin thefts (2013) Retrieved November 1, 2018, from https ://naked secur ity.sopho s.com/2013/08/12/andro id-rando m-numbe r-flaw-impli cated -in-bitco in-theft s/
- Ducklin P (2018) What are "WannaMine" attacks, and how do I avoid them? Retrieved from https ://naked secur ity.sopho s.com/2018/01/31/what-are-wanna mine-attac ks-and-how-do-i- avoid -them/
- Eskandari S, Leoutsarakos A, Mursch T, Clark J (2018) A first look at browser-based cryptojacking. arXiv preprint arXiv :1803.02887
- Funk E, Riddell J, Ankel F, Cabrera D (2018) Blockchain technol- ogy: a data framework to improve validity, trust, and accountabil- ity of information exchange in health professions education. Acad Med 93(12):1791-1794
- Gao F, Zhu L, Shen M, Sharif K, Wan Z, Ren K (2018) A block- chain-based privacy-preserving payment mechanism for vehicle- to-grid networks. IEEE Network, New York
- Gräther W, Kolvenbach S, Ruland R, Schütte J, Torres C, Wend- land F (2018) Blockchain for education: lifelong learning pass- port. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
- Grover LK (1996) Fast quantum mechanical algorithm for data- base search. In: ACM symposium on the theory of computing, pp 212-219
- Grover LK (1997) Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett 78:325-328
- Hegadekatti V, Hegadekatti K (2018) Blockchain applications in medical sciences. Int J Sci Res 7(4)
- Heilman E, Zohar A, Goldberg S (2015) Eclipse attacks on bit- coin's peer-to peer network. In: USENIX conference on security symposium, pp 129-144
- Huang X, Xu C, Wang P, Liu H (2018) LNSC: a security model for electric vehicle and charging pile management based on block- chain ecosystem. IEEE Access 6:13565-13574
- Hunt GD, Koved L (2018) U.S. Patent Application No. 15/372,068
- IDC (2012) Executive summary: a universe of opportunities and challenges. IDC, Framingham
- Jain A, Jain A, Chauhan N, Singh V, Thakur N (2018) Seguro Digital storage of documents using Blockchain
- Jiao Y, Wang P, Niyato D, Xiong Z (2018) Social welfare maximi- zation auction in edge computing resource allocation for mobile blockchain. In: 2018 IEEE international conference on commu- nications (ICC), pp 1-6. IEEE, New York
- Kim H-W, Jeong Y-S (2018) Secure authentication-management human-centric scheme for trusting personal resource information on mobile cloud computing with blockchain. Hum-Centric Com- put Inf Sci 8(1):11
- Lee J-H (2018) Bidaas: blockchain based id as a service. IEEE Access 6:2274-2278
- Li GD, Jenni Kassem M (2018) Blockchain in the built environ- ment: analysing current applications and developing an emergent framework. Northumbria, Newcastle
- Li M, Weng J, Yang A, Lu W, Zhang Y, Hou L, Liu J-N, Xiang Y, Deng RH (2017) Crowdbc: a blockchain-based decentralized framework for crowdsourcing. In: Technical report, IACR Cryp- tology, ePrint archive, University of California, Santa Barbara, vol 444
- Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L (2017) Provchain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of the 17th IEEE/ACM international symposium on cluster, cloud and grid computing, pp 468-477. IEEE Press, New York
- Lin C, He D, Huang X, Choo K-KR, Vasilakos A V (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42-52
- Lu Y, Tang Q, Wang G (2018) Zebralancer: private and anony- mous crowdsourcing system atop open blockchain. arXiv preprint: arXiv :1803.01256
- Maria A, Zohar V (2017) Hijacking bitcoin: routing attacks on cryptocurrencies,. In: IEEE symposium on security and privacy, pp 375-392
- Menn J (2013) Exclusive: secret contract tied NSA and security industry pioneer. Retrieved November 1, 2018, from https ://www. reute rs.com/artic le/us-usa-secur ity-rsa/exclu sive-secre t-contr act- tied-nsa-and-secur ity-indus try-pione er-idUSB RE9BJ 1C220 13122 0
- Musch M, Wressnegger C, Johns M, Rieck K (2018) Web-based cryptojacking in the wild. arXiv preprint: arXiv :1808.09474
- Nowiński W, Kozma M (2017) How can blockchain technol- ogy disrupt the existing business models? Entrep Bus Econ Rev 5(3):173-188
- List Of High Profile Cryptocurrency Hacks So Far (August 24th 2017). (2017, August 24). Retrieved Novem- ber 1, 2018, from http://storeofvalueblog.com/posts/ cryptocurrency-hacks-so-far-august-24th/
- Otte P, de Vos M, Pouwelse J (2017) Trustchain: a sybil-resistant scalable blockchain. Future Gener Comput Syst
- Keutmann (2018) Keutmann/Trustchain. Retrieved November 1, 2018, from https ://githu b.com/keutm ann/Trust chain
- Poon J, Buterin V (2017) Plasma: Scalable autonomous smart contracts. White paper
- Prinz W (2018) Blockchain and CSCW-shall we care? In: Pro- ceedings of 16th European conference on computer-supported cooperative work-exploratory papers. European Society for Socially Embedded Technologies (EUSSET)
- Qin D, Wang C, Jiang Y (2018) Rpchain: a blockchain-based aca- demic social networking service for credible reputation building. In: International conference on blockchain. Springer, New York, pp 183-198
- The IRS Has a Way to ID Bitcoin Tax Cheats (n.d.) Retrieved November 1, 2018, from http://fortu ne.com/2017/08/22/irs-tax- cheat s-bitco in-chain alysi s/
- Schneier on Security (2007) Retrieved November 1, 2018, from https ://www.schne ier.com/essay s/archi ves/2007/11/did_nsa_ put_a_secre t.html
- Schneier NFB (2003) Practical cryptography. Wiley, Indianapolis
- Shah SN (2018) Distributed electronic document review in a blockchain system and computerized scoring based on textual and visual feedback, 16 Jan 2018. US patent 9870591
- Nilsson K (2017) Breaking open the MtGox case, part 1. Retrieved November 1, 2018, from https ://blog.wizse c.jp/2017/07/break ing- open-mtgox -1.html
- Stevens M, Pierre K, Albertini A, Markov Y, Bursztein E (2017) The first collision for full SHA-1. In: Katz J, Shacham H (eds) Advances in cryptology-crypto 2017. Springer, New York
- Swan M, Brunswicker S (2018) Blockchain economic networks and algorithmic trust. In: AMCIS 2018
- Turkanović M, Hölbl M, Košič K, Heričko M, Kamišalić A (2018) Eductx: a blockchain-based higher education credit platform. IEEE Access 6:5112-5127
- University Stanford (2011) Pertinent side channel attacks on ellip- tic curve cryptographic systems. Stanford University, Stanford
- Vo HT, Kundu A, Mohania MK (2018) Research directions in blockchain data management and analytics. In: EDBT, pp 445-448
- Wang F (2015) Eclipse attacks on bitcoin's peer-to-peer network. https ://mediu m.com/mit-secur ity-semin ar/eclip se-attac ks-on-bitco in-s-peer-to-peer-netwo rk-e0da7 97302 c2
- Wang Q, Qin B, Hu J, Xiao F (2017) Preserving transaction privacy in bitcoin. Future Generation Comput Syst. https ://doi. org/10.1016/j.futur e.2017.08.026
- Wang S, Taha A, Wang J (2018) Blockchain-assisted crowd- sourced energy systems. arXiv preprint: arXiv :1802.03099
- Weaknesses. (n.d.). Retrieved November 1, 2018, from https :// en.bitco in.it/wiki/Weakn esses
- Wirth C, Kolain M (2018) Privacy by blockchain design: a block- chain-enabled GDPR-compliant approach for handling personal data. In: Proceedings of 1st ERCIM blockchain workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
- Zhang R (2018) Blockchain scalability: prospective solutions for bitcoin, ethereum, and other blockchain networks
- Zhao H, Bai P, Peng Y, Xu R (2018) Efficient key manage- ment scheme for health blockchain. CAAI Trans Intell Technol